General

  • Target

    133b2b5de00d74365411ad22a9cc1f40a4fc9cd3e3c216a999488d543abe4c0e

  • Size

    99KB

  • Sample

    220212-fx8z1sgdc3

  • MD5

    218854d4ce047cb7805083cdeccf1a54

  • SHA1

    405420b49d15f116d76f7c7881978e27173d9dbf

  • SHA256

    133b2b5de00d74365411ad22a9cc1f40a4fc9cd3e3c216a999488d543abe4c0e

  • SHA512

    67b961d14cbebba6354e6b511179103362d42fe4fdd057c33e6df5a28aa1454c850c63bd868ca50fb1a4f146022286cbef56a36a4009470a67d6a04e2556345a

Malware Config

Targets

    • Target

      133b2b5de00d74365411ad22a9cc1f40a4fc9cd3e3c216a999488d543abe4c0e

    • Size

      99KB

    • MD5

      218854d4ce047cb7805083cdeccf1a54

    • SHA1

      405420b49d15f116d76f7c7881978e27173d9dbf

    • SHA256

      133b2b5de00d74365411ad22a9cc1f40a4fc9cd3e3c216a999488d543abe4c0e

    • SHA512

      67b961d14cbebba6354e6b511179103362d42fe4fdd057c33e6df5a28aa1454c850c63bd868ca50fb1a4f146022286cbef56a36a4009470a67d6a04e2556345a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks